Convergence Technologies SlideShowSIP

download Convergence Technologies SlideShowSIP

of 102

Transcript of Convergence Technologies SlideShowSIP

  • 7/31/2019 Convergence Technologies SlideShowSIP

    1/102

    ConvergenceTechnologies

  • 7/31/2019 Convergence Technologies SlideShowSIP

    2/102

    Lesson 1:Convergent Network

    Traffic Protocols

  • 7/31/2019 Convergence Technologies SlideShowSIP

    3/102

    ConvergenceTechnologies

    Objectives

    Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traversemultiple WAN links, and call and call flow descriptions

    Define the Realtime Transport Protocol (RTP) and theRealtime Transport Control Protocol (RTCP)

    Identify the components of Session Initiation Protocol (SIP)and describe the format of an SIP Uniform Resource Identifier (URI)

    Identify the functions of signaling protocols for convergednetworks (e.g., Session Initiation Protocol [SIP], H.323, H.225,H.320, H.450, Media Gateway Control Protocol [MGCP],

    Media Gateway Control [Megaco]) Compare and contrast the functions of gatekeepers,

    gateways and proxies in relation to SIP and H.323 devices Compare and contrast SIP, H.323 and Megaco/MGCP

  • 7/31/2019 Convergence Technologies SlideShowSIP

    4/102

    ConvergenceTechnologies

    Defining Convergence

    Convergence The integration of telephony anddata technologies Integration includes:

    Placing the voice network (telephony), the

    video network (television, satellite) and theInternet (rich media) onto common platforms

  • 7/31/2019 Convergence Technologies SlideShowSIP

    5/102

    ConvergenceTechnologies

    Smart Network and Dumb Network

  • 7/31/2019 Convergence Technologies SlideShowSIP

    6/102

    ConvergenceTechnologies

    Circuit-Based vs.Convergence Calling

    Circuit-switched network uses a dedicated physical pathto send and receive information

    Circuit-based calls: Provide very good voice quality

    May fail if the destination is busy or the network fails atany point in the connection Packet-switched network places addressing information

    into data packets Convergence-based calls:

    Dynamically reroute packets to other network nodes if anetwork node fails

    Result in increased latency because packetization andcompression add processing time to the signal

  • 7/31/2019 Convergence Technologies SlideShowSIP

    7/102

    ConvergenceTechnologies

    Transport Through aPacket-Switched Network

    Packets are encapsulated in Ethernet frames At Layer 4, source and destination port

    numbers are added At Layer 3, source and destination IP addresses

    are added At Layer 2, source and destination MAC

    addresses are added

  • 7/31/2019 Convergence Technologies SlideShowSIP

    8/102

    ConvergenceTechnologies

    User Datagram Protocol

    UDP header is very simple, consisting of sourceand destination port numbers, a length field, anda checksum field

  • 7/31/2019 Convergence Technologies SlideShowSIP

    9/102

    ConvergenceTechnologies

    Realtime Transport Protocol (RTP)

    Used to transport voice and video payloads for real-time applications Provides end-to-end delivery services Runs over both UDP and TCP

    Uses even port numbers that are generallyassigned dynamically

    Default port is 5004 RTP profiles define a set of codes for each type of

    payload

  • 7/31/2019 Convergence Technologies SlideShowSIP

    10/102

    ConvergenceTechnologies

    RTP Packets

    RTP packets are encapsulated in UDP packets

  • 7/31/2019 Convergence Technologies SlideShowSIP

    11/102

    ConvergenceTechnologies

    Realtime Transport ControlProtocol (RTCP)

    Does not transport any data itself Partners with Realtime Transport Protocol (RTP) Monitors the media stream

    Provides feedback on the Quality of Service (QoS)being provided by RTP

    While RTP uses an even port number, RTCP alwaysuses the next odd port number

    Default port is 5005

  • 7/31/2019 Convergence Technologies SlideShowSIP

    12/102

    ConvergenceTechnologies

    Session Initiation Protocol (SIP)

    Signaling protocol only does not deliver mediastreams, nor does it control the delivery of mediastreams

    Initiates and manages sessions (or connections)

    between 2 or more participants Primary function is to set up, modify and tear down a connection

    Developed by the IETF, SIP is modeled after

    Hypertext Transfer Protocol (HTTP)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    13/102

    ConvergenceTechnologies

    SIP Related Protocols

    Session Description Protocol (SDP) Describes the characteristics of end points in a

    session Multiprotocol Label Switching (MPLS)

    Can provide QoS for SIP connections Resource Reservation Protocol (RSVP)

    Can provide QoS for SIP connections Differentiated Services (DiffServ)

    Can provide QoS for SIP connections

  • 7/31/2019 Convergence Technologies SlideShowSIP

    14/102

    ConvergenceTechnologies

    SIP ports and URIs

    SIP uses both UDP and TCP ports 5060 by default SIP URI takes the following format:

    sip:user@host SIP URI examples:

    sip:[email protected]:[email protected]:[email protected]

  • 7/31/2019 Convergence Technologies SlideShowSIP

    15/102

    ConvergenceTechnologies

    SIP Components

    User agents User agent client (UAC): initiates an SIP request User agent server (UAS): responds to SIP request

    Servers:

    Proxy: perform routing, authentication andaccounting functions

    Redirect: relays information to a user agent,such as the IP address of the party to be called

    Registrar: enables a client to let a proxy or redirect server know how the client can bereached

  • 7/31/2019 Convergence Technologies SlideShowSIP

    16/102

    ConvergenceTechnologies

    SIP Messages

    Requests INVITE ACK BYE

    Cancel Options Register

    Each request (except for an ACK request) requiresa response

  • 7/31/2019 Convergence Technologies SlideShowSIP

    17/102

    ConvergenceTechnologies

    SIP Messages (cont'd) Responses are composed of a 3-digit Status Code

    and an associated Reason Phrase

  • 7/31/2019 Convergence Technologies SlideShowSIP

    18/102

    ConvergenceTechnologies

    SIP Calls

    Session Invitation Consists of oneINVITE request,usually sent to anSIP proxy

    A 200 OK responseis generated whenthe called partyanswers the phone

    Media streams are

    sent directlybetween endpoints

  • 7/31/2019 Convergence Technologies SlideShowSIP

    19/102

    ConvergenceTechnologies

    H.323

    Defines the following: How an audiographic call is set up across a

    network How to negotiate capabilities

    How to transmit data and control conferencing Which default audio and video codecs to use

  • 7/31/2019 Convergence Technologies SlideShowSIP

    20/102

    ConvergenceTechnologies

    H.323 Architecture

    Terminals H.323 end points Can be a stand-alone device (IP phone) or a

    logical device within a PC

    Includes audio and video codecs Must support H.245 for capabilities negotiation Uses Q.931 for call signaling and setup Uses H.225 RAS for communicating with

    gatekeepers Must support RTP and RTCP

  • 7/31/2019 Convergence Technologies SlideShowSIP

    21/102

    ConvergenceTechnologies

    H.323 Architecture (cont'd)

    Gateways Connect and translate protocols between

    dissimilar networks Provide protocol translation, media format

    conversion and data transfer between H.323and non-H.323 networks Optional element; not required for connections

    within one LAN

    Required to establish connections betweenterminals in H.323 networks and terminals innetworks with different protocols

  • 7/31/2019 Convergence Technologies SlideShowSIP

    22/102

    ConvergenceTechnologies

    H.323 Architecture (cont'd)

    Gatekeeper functionality: Admission control Address translation Bandwidth control Zone management

    Call control for point-to-point conferences Codec translation Call authorization Bandwidth and call management

    Accounting and billing Call routing

    Multipoint Control Unit (MCU) required whenever three or more H.323 terminals are connected

  • 7/31/2019 Convergence Technologies SlideShowSIP

    23/102

  • 7/31/2019 Convergence Technologies SlideShowSIP

    24/102

    ConvergenceTechnologies

    H.225 RAS

    RAS messages (requests and responses) are sent betweenend points and gatekeepers via UDP Gatekeeper messages are sent for gatekeeper discovery

    (GRQ, GCF, GRJ ) Registration messages are sent for negotiating a

    registration with a gatekeeper ( RRQ, RCF, RRJ ) Admission messages are requests and replies for addresstranslation ( ARQ, ACF, ARJ )

    Status messages are used to monitor end point statusduring calls that are routed through a gatekeeper ( IRQ,

    IRR) Disengage messages signal the end of a call ( DRQ, DCF )

  • 7/31/2019 Convergence Technologies SlideShowSIP

    25/102

    ConvergenceTechnologies

    H.323 Calls

    In a typical call: A client contacts a gatekeeper and requests

    an address using H.225 RAS admission request(ARQ)

    Gatekeeper forwards address to the client Client establishes session using H.225 Session is negotiated using H.245

  • 7/31/2019 Convergence Technologies SlideShowSIP

    26/102

    ConvergenceTechnologies

    H.323 Calls (cont'd)

    H.225 call signaling is used between terminals toset up and tear down a connection

  • 7/31/2019 Convergence Technologies SlideShowSIP

    27/102

    ConvergenceTechnologies

    H.323 Calls (cont'd)H.245 call control signaling is used for negotiating

    capabilities and master/slave determination

  • 7/31/2019 Convergence Technologies SlideShowSIP

    28/102

  • 7/31/2019 Convergence Technologies SlideShowSIP

    29/102

    ConvergenceTechnologies

    Network Call Signaling (NCS)

    Network Call Signaling (NCS) a protocol that createsembedded agents to use MGCP in a network

  • 7/31/2019 Convergence Technologies SlideShowSIP

    30/102

    ConvergenceTechnologies

    Megaco/H.248

    Enhanced version of MGCP Result of a joint effort between IETF and ITU Megaco enables the separation of call control

    from media conversion

    Megaco instructs an MG to connect streamscoming from outside a packet or cell datanetwork onto a packet or cell stream such asRealtime Transport Protocol (RTP) streams

  • 7/31/2019 Convergence Technologies SlideShowSIP

    31/102

    ConvergenceTechnologies

    SIP vs. H.323 vs. Megaco

  • 7/31/2019 Convergence Technologies SlideShowSIP

    32/102

    ConvergenceTechnologies

    Summary

    Compare and contrast circuit-switched and packet-switched technologies, including ways that packets traversemultiple WAN links, and call and call flow descriptionsDefine the Realtime Transport Protocol (RTP) and theRealtime Transport Control Protocol (RTCP)

    Identify the components of Session Initiation Protocol (SIP)and describe the format of an SIP Uniform Resource Identifier (URI)Identify the functions of signaling protocols for convergednetworks (e.g., Session Initiation Protocol [SIP], H.323, H.225,H.320, H.450, Media Gateway Control Protocol [MGCP],Media Gateway Control [Megaco])Compare and contrast the functions of gatekeepers,gateways and proxies in relation to SIP and H.323 devices

  • 7/31/2019 Convergence Technologies SlideShowSIP

    33/102

    Lesson 2:Implementing VoIP

  • 7/31/2019 Convergence Technologies SlideShowSIP

    34/102

    ConvergenceTechnologies

    Objectives

    List essential steps for qualifying a network's ability to supportconvergence (e.g., cable inspection, existing and maximumdevice capacity, replacing hubs with switches, Power over Ethernet [PoE] requirements, VLAN creation, conductingnetwork reconnaissance)

    Describe the features of Telephony Application

    Programming Interface (TAPI) and Messaging ApplicationProgramming Interface (MAPI) in a converged solution Implement Telephone Number Mapping (ENUM), elements

    of global and private numbering plans, Local Number Portability (LNP)/Wireless LNP, end-point addressing, pathselection, calling classes, digit manipulation, overlappingnumber ranges

    Identify common G.7xx codecs and their bandwidthrequirements in a converged environment (e.g., G.711,G.729, G.729a, G.726 and others)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    35/102

    ConvergenceTechnologies

    Objectives (cont'd)

    Describe the impact of compression on voice quality, andidentify issues involved when converting voice to analogueand digital formats

    Identify benefits and drawbacks of various codecs inrelation to bandwidth and voice quality

    Calculate and estimate bandwidth usage for various

    codecs, including considerations of overhead, connectionquality, and other factors that affect theoretical calculations(e.g., capacity planning, choosing connection speeds)

    Recommend codecs for use with local/in-network/within-LAN calls, and for across WAN connections

    Explain wireless convergence technologies, including DigitalEnhanced Cordless Telecommunications (DECT) and DECTlayers, Personal Wireless Telephone (PWT), Generic AccessProfile (GAP), expected ranges for interference-freecommunication, and the MHz ranges for each standard

  • 7/31/2019 Convergence Technologies SlideShowSIP

    36/102

    ConvergenceTechnologies

    Objectives (cont'd)

    Identify the elements of the IP Multimedia Subsystem (IMS) Explain real-time faxing, according to standards such as ITU

    T.38 Explain store-and-forward faxing, according to standards

    such as ITU T.37 Identify the features, benefits, problems and management

    of presencing, including single sign-on, features available invarious devices

    List unified message methods and benefits (e.g., fax, voice,text, video)

    Identify common and essential videoconferencing codecs,

    standards and practises (e.g., Moving Picture Experts Group[MPEG], Quarter Common Intermediate Format [QCIF],etc.), and choose the appropriate codecs for variousbandwidths

  • 7/31/2019 Convergence Technologies SlideShowSIP

    37/102

    ConvergenceTechnologies

    Objectives (cont'd)

    Summarize television/video-calling standards and practises Identify multimedia conferencing standards, including all

    subsets of T.120 (e.g., T.123, T.124, T.135) Explain fundamentals of Internet Protocol television (IPTV),

    including set-top box, Video on Demand (VoD), acceptedcodecs (e.g., Video Codec [VC-1])

    Identify the purpose and function of voice andvideoconferencing hardware (e.g., Multipoint Control Unit[MCU], set-top box, Session Border Controller [SBC])

    Compare and contrast traditional and IP-based privatebranch exchange (PBX) systems

    Identify convergent terminal equipment and software,including analogue telephone adapter (ATA), single lineadapter, soft phones (WiFi, PDA, PC-based), analoguephones, time division multiplexer (TDM), protocol-specifichandsets (e.g., SIP, Megaco)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    38/102

    ConvergenceTechnologies

    Objectives (cont'd)

    Explain power issues, including redundancy planning, Power over Ethernet (PoE)/802.3af, PoE classes, expected voltage,wattage, power sourcing equipment (PSE), powereddevices (PDs)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    39/102

    ConvergenceTechnologies

    Planning aConvergent Network

    Major phases of an implementation plan includethese steps: Identifying expectations Determining bandwidth requirements Performing a network health check Creating a phased deployment plan

  • 7/31/2019 Convergence Technologies SlideShowSIP

    40/102

    ConvergenceTechnologies

    Identifying Expectations

    Identify how network(s) will be used Identify specific protocols that will be used Identify and explain potential challenges

  • 7/31/2019 Convergence Technologies SlideShowSIP

    41/102

    ConvergenceTechnologies

    Determining Bandwidth Requirements

    Identify current digital connection Determine bandwidth required by existing network Monitor current network performance Evaluate current network performance

    Calculate additional requirements for VoIP Take wide area network (WAN) links into account Take growth into account

  • 7/31/2019 Convergence Technologies SlideShowSIP

    42/102

    ConvergenceTechnologies

    Performing a Network Health Check

    Check network cabling Replace hubs with Layer 2 switches Implement VLANs Prioritize VLAN traffic Check routers

    Identify the entity that manages Internet router Examine current IP addressing scheme Examine Domain Name System (DNS) Examine firewall

    Identify whether NAT will be implemented Identify whether VPNs must be supported Identify whether any part of the LAN will be wireless

  • 7/31/2019 Convergence Technologies SlideShowSIP

    43/102

    ConvergenceTechnologies

    Creating a Phased Deployment Plan

    Create a detailed, approved implementationplan Use a test network Deploy incrementally

    Do not begin with the sales department

  • 7/31/2019 Convergence Technologies SlideShowSIP

    44/102

    ConvergenceTechnologies

    TAPI and MAPI

    Telephony Application Programming Interface(TAPI) is an API used for connecting a Windows PCto telephone services

    Messaging Application Programming Interface(MAPI) is a Windows API that allows differente-mail applications to work together to distributemail

  • 7/31/2019 Convergence Technologies SlideShowSIP

    45/102

    ConvergenceTechnologies

    Numbering Plans

    Private numbering plansallow a company to createits own numbering system

    Extensions can be createdbased on an organisationsneeds

    Number plan defines theformat of telephonenumbers

    Implementing VoIP involvesdesigning a numberingplan and a dial plan.

    Dial plan must include rulesfor dealing with: End point addressing Path selection Calling classes

    Digit manipulation Overlapping number

    ranges

  • 7/31/2019 Convergence Technologies SlideShowSIP

    46/102

    ConvergenceTechnologies

    Telephone Number Mapping (ENUM)

    Maps E.164 telephone numbers into the DomainName System (DNS) Creates a dynamic mapping of E.164 addresses to

    IP addresses

    ENUM domain names are hosted in the e164.arpadomain A telephone number such as +1 (602) 555-1212

    is converted into the ENUM domain name2.1.2.1.5.5.5.2.0.6.1.e164.arpa

    ENUM domain name resolves to one or moreDNS NAPTR records

  • 7/31/2019 Convergence Technologies SlideShowSIP

    47/102

    ConvergenceTechnologies

    G.7xx Codecs

    Various codecs provide different amounts ofcompression Compression allows more voice traffic, but can

    also:

    Introduce delay Adversely affect voice quality Put a significant strain on CPU resources,

    depending on the complexity of the algorithm

    and the amount of compression

  • 7/31/2019 Convergence Technologies SlideShowSIP

    48/102

    ConvergenceTechnologies

    Comparison of G.7xx Codecs

  • 7/31/2019 Convergence Technologies SlideShowSIP

    49/102

    ConvergenceTechnologies

    Calculating VoIP Bandwidth Requirements

    Calculations for bandwidth requirements mustfactor in: Codec, sample period and frame size Frames per packet

    IP overhead Ethernet overhead Number of simultaneous calls Silence suppression

    Compressed headers

  • 7/31/2019 Convergence Technologies SlideShowSIP

    50/102

    ConvergenceTechnologies

    Wireless Convergence Technologies

    Components Radio exchange Base stations (transceivers) Portable phones

    Digital Enhanced Cordless Telecommunications (DECT) is an

    ETSI standard for digital portable phones Generic Access Profile (GAP) guarantees interoperability

    between any handset and any base station, regardlessof make or model

    Operates in the 1880 MHz to 1900 MHz band in Europe,

    Africa, Australia and Asia (except China) Operates in the following bands in North America: 902

    MHz to 928 MHz, 2400 MHz to 2483.5 MHz, 5725 MHz to5850 MHz

  • 7/31/2019 Convergence Technologies SlideShowSIP

    51/102

    ConvergenceTechnologies

    IP Multimedia Subsystem (IMS)

    IP Multimedia Subsystem (IMS) is a network architecturedesigned to enable convergence of voice and dataapplications and various mobile network technologies

    IMS architecture includes 3 layers: Connectivity layer (also called the transport layer)

    composed of routers, media gateways and switches Control layer composed of network control servers that

    manage call setup, modification and release Application layer (also called the service layer)

    composed of application and content servers that

    deliver services within the network

  • 7/31/2019 Convergence Technologies SlideShowSIP

    52/102

    ConvergenceTechnologies

    Facsimile

    Fax transmissions impose special demands on VoIPbecause fax standards were designed for circuit-switched connections

    T.30 standardizes the way in which faxes are sentacross standard circuit-switched telephone lines

    T.38 designed for real-time fax transmissions over an IP network

    T.37 designed for store-and-forward faxtransmission over an IP network

  • 7/31/2019 Convergence Technologies SlideShowSIP

    53/102

    ConvergenceTechnologies

    Presencing

    Presence information is a status indicator thatconveys a persons willingness and ability toengage in communications

    Presencing can span different communicationchannels

    Multiple Points of Presence (MPOP) describes howmultiple communications devices can combinestate to provide a multidimensional view of ausers availability status

    Presencing requires collaboration among anumber of devices and the presence services withwhich each of them is connected

    Presencing raises privacy concerns

  • 7/31/2019 Convergence Technologies SlideShowSIP

    54/102

    ConvergenceTechnologies

    Unified Messaging

    In unified messaging (UM), all messaging mediacan come together in the form of a unifiedmailbox and/or alert service

    Unified messaging offers Single delivery Single repository Single access Single notification

  • 7/31/2019 Convergence Technologies SlideShowSIP

    55/102

    ConvergenceTechnologies

    Video Services

    Video codecs and standards include: H.261 Common Intermediate Format (CIF)

    Quarter CIF (QCIF) Sub Quarter CIF (SQCIF) 4CIF 16CIF

    H.263 Moving Picture Experts Group (MPEG)

    MPEG-1

    MPEG-2/H.262 MPEG-4 H.264/MPEG-4 Advanced Video Coding (AVC) Realtime Streaming Protocol (RTSP)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    56/102

    ConvergenceTechnologies

    T.120 Multimedia Conferencing Standards

    Key features: Support for real-time communication between

    two or more entities Support for application sharing, electronic

    whiteboarding, file exchange and chat Support for interoperability between end points

    from multiple vendors Support for a broad range of transport options

    Co-existence with other standards

  • 7/31/2019 Convergence Technologies SlideShowSIP

    57/102

    ConvergenceTechnologies

    T.120 Architecture

    Additional protocols: T.128: Multipoint application sharing T.134: Text chat application entity

    T.135: User-to-reservation system transactions with T.120conferences T.136: Remote device control application protocol T.137: Virtual meeting room management services and

    protocol

  • 7/31/2019 Convergence Technologies SlideShowSIP

    58/102

    ConvergenceTechnologies

    Internet Protocol TV (IPTV)

    Internet Protocol TV (IPTV) can include Live broadcast (uses Internet Group Messaging

    Protocol [IGMP] version 2) Video on Demand (uses Realtime Streaming

    Protocol [RTSP]) Requires a set-top box or PC to receive content

    from a media server Common codecs include: H.264/MPEG-4 AVC,

    MPEG-2, VC-1

  • 7/31/2019 Convergence Technologies SlideShowSIP

    59/102

    ConvergenceTechnologies

    Common Convergence Devices

    Videoconferencing hardware Multipoint Control Unit (MCU) Session Border Controller (SBC)

    IP PBX or traditional PBX

    Terminal equipment VoIP phones Digital phones analogue telephones and adapters Soft phones Single line adapter Time division multiplexer

  • 7/31/2019 Convergence Technologies SlideShowSIP

    60/102

    ConvergenceTechnologies

    Power Issues for Convergent Networks

    Redundant power Uninterruptible power supply (UPS)

    Power over Ethernet (PoE) Power Sourcing Equipment (PSE) provides power Powered Devices (PD) use the power provided

    Maximum power supplied is 15.4 watts at 48 volts Five power classes (0-4) Two power modes (Mode A and Mode B)

    PSE capable of determining the mode a PD uses

    Injector supplies power into the appropriate wires of theEthernet cable Deployment of PoE requires a power budget to ensure

    that PSE can supply sufficient power to all PDs

  • 7/31/2019 Convergence Technologies SlideShowSIP

    61/102

    ConvergenceTechnologies

    Summary

    List essential steps for qualifying a network's ability to supportconvergence (e.g., cable inspection, existing and maximumdevice capacity, replacing hubs with switches, Power over Ethernet [PoE] requirements, VLAN creation, conductingnetwork reconnaissanceDescribe the features of Telephony ApplicationProgramming Interface (TAPI) and Messaging ApplicationProgramming Interface (MAPI) in a converged solutionImplement Telephone Number Mapping (ENUM), elementsof global and private numbering plans, Local Number Portability (LNP)/Wireless LNP, end-point addressing, pathselection, calling classes, digit manipulation, overlapping

    number rangesIdentify common G.7xx codecs and their bandwidthrequirements in a converged environment (e.g., G.711,G.729, G.729a, G.726 and others)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    62/102

    ConvergenceTechnologies

    Summary (cont'd)

    Describe the impact of compression on voice quality, andidentify issues involved when converting voice to analogueand digital formatsIdentify benefits and drawbacks of various codecs inrelation to bandwidth and voice qualityCalculate and estimate bandwidth usage for various

    codecs, including considerations of overhead, connectionquality, and other factors that affect theoretical calculations(e.g., capacity planning, choosing connection speeds)Recommend codecs for use with local/in-network/within-LAN calls, and for across WAN connectionsExplain wireless convergence technologies, including DigitalEnhanced Cordless Telecommunications (DECT) and DECTlayers, Personal Wireless Telephone (PWT), Generic AccessProfile (GAP), expected ranges for interference-freecommunication, and the MHz ranges for each standard

  • 7/31/2019 Convergence Technologies SlideShowSIP

    63/102

    ConvergenceTechnologies

    Summary (cont'd)

    Identify the elements of the IP Multimedia Subsystem (IMS)Explain real-time faxing, according to standards such as ITUT.38Explain store-and-forward faxing, according to standardssuch as ITU T.37Identify the features, benefits, problems and management

    of presencing, including single sign-on, features available invarious devicesList unified message methods and benefits (e.g., fax, voice,text, video)Identify common and essential videoconferencing codecs,standards and practises (e.g., Moving Picture Experts Group[MPEG], Quarter Common Intermediate Format [QCIF],etc.), and choose the appropriate codecs for variousbandwidths

  • 7/31/2019 Convergence Technologies SlideShowSIP

    64/102

    ConvergenceTechnologies

    Summary (cont'd)

    Summarize television/video-calling standards and practisesIdentify multimedia conferencing standards, including allsubsets of T.120 (e.g., T.123, T.124, T.135)Explain fundamentals of Internet Protocol television (IPTV),including set-top box, Video on Demand (VoD), acceptedcodecs (e.g., Video Codec [VC-1])

    Identify the purpose and function of voice andvideoconferencing hardware (e.g., Multipoint Control Unit[MCU], set-top box, Session Border Controller [SBC])Compare and contrast traditional and IP-based privatebranch exchange (PBX) systemsIdentify convergent terminal equipment and software,including analogue telephone adapter (ATA), single lineadapter, soft phones (WiFi, PDA, PC-based), analoguephones, time division multiplexer (TDM), protocol-specifichandsets (e.g., SIP, Megaco)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    65/102

    ConvergenceTechnologies

    Summary (cont'd)

    Explain power issues, including redundancy planning, Power over Ethernet (PoE)/802.3af, PoE classes, expected voltage,wattage, power sourcing equipment (PSE), powereddevices (PDs)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    66/102

    Lesson 3:Traffic, Troubleshooting

    and Security

  • 7/31/2019 Convergence Technologies SlideShowSIP

    67/102

    ConvergenceTechnologies

    Objectives

    Define latency, jitter and wander Implement methods for reducing or eliminating latency, jitter

    and wander (e.g., implementing a jitter buffer, implementingQoS, traffic shaping, VLANs)

    Explain the impact of large frames on real-timecommunications

    Identify factors that affect the bandwidth of voice andvideo calls on convergent networks (e.g., latency, protocolincompatibility, MTU, codec choice, compression, QoSissues, packet reordering, loss of feature set)

    Use accepted industry standards such as the Mean OpinionScore (MOS) to determine voice and video quality, includingMOS for popular codecs, standard MOS numbers, R-valueand subjective video quality

  • 7/31/2019 Convergence Technologies SlideShowSIP

    68/102

    ConvergenceTechnologies

    Objectives (cont'd)

    Identify common network bottlenecks in convergentnetworks, including solutions (e.g., monitoring network devices and protocols, creating a baseline, changingconfiguration, upgrading hardware)

    Analyze traffic in a convergent network and resolve

    problems using a packet sniffer, monitoring software, andhardware solutions

    Troubleshoot convergent communications over wirelessnetworks

    Identify problems in contacting emergency services through

    convergent networks Parse a Call Detail Record (CDR) and list relevant entries

  • 7/31/2019 Convergence Technologies SlideShowSIP

    69/102

    ConvergenceTechnologies

    Objectives (cont'd)

    Identify types and effects of attacks in convergent networks,including man-in-the-middle attacks (e.g., packet sniffing,TCP connection hijacking, registration hijacking), voice mailcompromises, viruses, brute-force and dictionary attacks,zero-day attacks, illicit servers, toll fraud and unsolicited calls

    Define denial-of-service (DOS) and distributed DOS (DDOS)

    attacks, and identify ways to counteract them, includingcommon traffic types used (e.g., SYN, UDP or ICMP flood),reconfiguring core upstream routers, using alternative sites,intentional and unintentional DOS

    Explain the practise and impact of VLAN hopping Explain the significance and impact of MAC address

    movements, additions and changes Identify types of intrusion detection (e.g., host-based,

    network-based, defining effective signatures, proactivedetection)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    70/102

    ConvergenceTechnologies

    Objectives (cont'd)

    Back up, upgrade and scan systems to thwart attacks,including backup types, system patches, service packs,firmware upgrades, optimal backup schedule

  • 7/31/2019 Convergence Technologies SlideShowSIP

    71/102

    ConvergenceTechnologies

    VoIP Variables

    VoIP variables conditions that cause problems invoice communications

    VoIP variables include: Delay the amount of wait time between the

    time a signal is sent and received Latency the amount of time required for data

    to be transmitted across a network Jitter variability in the arrival rate of data

    packets transmitted over a network Wander variability of more than one second

    in the arrival rate of data packets transmittedover a network (long-term jitter)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    72/102

    ConvergenceTechnologies

    Delay Fixed delays

    Propagation delay caused by the distance betweenthe request and the server fulfilling the request Serialization delay the time required to physically place

    voice call bits on a trunk line End point processing delay caused by compressing/

    decompressing and encoding/decoding data Packetization delay the time required to place digital

    traffic into a particular medium Variable delays

    Queuing delay the time packets wait for other packetsto be placed onto a trunk line

    Router processing delay the time required for a router to apply QoS settings, or to process packets that havearrived out of order

  • 7/31/2019 Convergence Technologies SlideShowSIP

    73/102

    ConvergenceTechnologies

    Latency

    Latency results when multiple delays occur The most significant source of latency is the digital

    signal processing that occurs in gateways androuters

    Round-trip latency is the total delay experiencedby two users on a phone call

    Round-trip latency in the PSTN is typically less than150 milliseconds, except on international calls

    ITU recommends that for good voice quality inVoIP calls, one-way latency must not exceed 150milliseconds

  • 7/31/2019 Convergence Technologies SlideShowSIP

    74/102

    ConvergenceTechnologies

    Jitter

    Jitter occurs when packets in a voice transmissiontake different paths over a network, causing themto arrive out of sequence

    A jitter buffer can correct this variability byproviding a space in memory that allows packetresequencing

  • 7/31/2019 Convergence Technologies SlideShowSIP

    75/102

    ConvergenceTechnologies

    Packet Handling in the Enterprise

    A chief cause of delay and jitter is queuing at therouter

    By default, routers process queues on a first in firstout (FIFO) basis

    Implementing QoS on routers improves voicequality

    Convergent QoS technologies include: Creating VLANS

    Assigning prioritization Setting IP precedence values Employing traffic-shaping algorithms

  • 7/31/2019 Convergence Technologies SlideShowSIP

    76/102

    ConvergenceTechnologies

    Wander

    Wander is due to synchronization problems in thenetwork clocks used to control transmissions

    When wander is detected, the signal must bereclocked, or synchronized, at the next network element to avoid propagating the wander activity

    The Network Time Protocol (NTP) ensures thatsystems are accurate to within milliseconds

    NTP servers belong to two strata: Stratum 1 clocks that are the most accurate;

    often GPS-enabled timekeeping systems Stratum 3/3E VoIP gatekeepers, gateways

    and PBXs

  • 7/31/2019 Convergence Technologies SlideShowSIP

    77/102

  • 7/31/2019 Convergence Technologies SlideShowSIP

    78/102

    ConvergenceTechnologies

    Other Throughput Considerations

    Additional factors that affect the quality of voicetransmissions include: Choice of codec Complexity of compression algorithm

    Lack of QoS support on the network Overutilization of routers Packet reordering (caused by congestion and

    queuing at routers)

    Protocol and codec incompatibility MTU setting Loss of feature set

    Connection QoS:

  • 7/31/2019 Convergence Technologies SlideShowSIP

    79/102

    ConvergenceTechnologies

    Connection QoS:Using Multiple Connections

    Connection QoS ensures that the gateway canprotect calls from network problems in severalways, including: Trunk busy-out

    Alternative gateway selection Fallback to the PSTN The gateway prevents a trunk from servicing a call

    if:

    The IP network fails The gateway detects an internal problem

    ( )

  • 7/31/2019 Convergence Technologies SlideShowSIP

    80/102

    ConvergenceTechnologies

    Mean Opinion Score (MOS)

    MOS is an industry standard numericalmeasurement of voice quality

    R l

  • 7/31/2019 Convergence Technologies SlideShowSIP

    81/102

    ConvergenceTechnologies

    R-value

    R-value is another industry standard for measuringvoice quality

    R-values are derived from direct measurements ofequipment and traffic parameters

    R-value score ranges from 1 (worst) to 100 (best) One MOS point is roughly equal to 20 R-value

    points, but the correlation is not linear

    f l d

  • 7/31/2019 Convergence Technologies SlideShowSIP

    82/102

    ConvergenceTechnologies

    Mean Opinion Scores for Popular AudioCodecs

  • 7/31/2019 Convergence Technologies SlideShowSIP

    83/102

    ConvergenceTechnologies

    Maintaining and TroubleshootingConvergent Networks

    Monitoring is an important aspect of maintainingconvergent networks

    The first step in monitoring is establishing a baseline A baseline is a record of normal network

    activity that serves as an example for comparing future network activity

    E bli hi B li

  • 7/31/2019 Convergence Technologies SlideShowSIP

    84/102

    ConvergenceTechnologies

    Establishing a Baseline

    Baseline measurement statistics should includedata on: Traffic analysis/end-to-end performance

    Identifies latency, percentage of packet lossand link utilization

    Tools include: ping and traceroute, andhardware monitoring mode

    Device performance

    Identifies factors such as CPU and memoryusage

    D i C fi ti

  • 7/31/2019 Convergence Technologies SlideShowSIP

    85/102

    ConvergenceTechnologies

    Device Configuration

    Device configuration directly affects the performance ofconvergent networks

    Check configurations of Switches

    Ensure VLANs are properly configured

    Ensure proper communication mode (full-duplex, half-duplex, auto-negotiation) settings on switch ports End points

    Ensure each end point has a valid IP address Ensure that communication mode on NIC is set

    properly Install firmware or software updates as they become

    available

    Troubleshooting Convergence in

  • 7/31/2019 Convergence Technologies SlideShowSIP

    86/102

    ConvergenceTechnologies

    g gWireless Networks

    In wireless networks, points for troubleshooting include: Access points (APs):

    Should support enterprise-level QoS Should provide overlapping coverage Should be deployed in sufficient number

    Should be able to reject calls when becomingoverloaded Should support roaming

    Environment Check for sources of interference

    Handsets Ensure proper configurations (for example, encryption

    keys) Install available updates/upgrades

    C ll D t il R d

  • 7/31/2019 Convergence Technologies SlideShowSIP

    87/102

    ConvergenceTechnologies

    Call Detail Records

    Call Detail Records include information about thethe following call details: Time Date

    Call duration Number dialed Caller ID information Extension

    Line/trunk location Cost Call completion status

    S it i C g t N t k

  • 7/31/2019 Convergence Technologies SlideShowSIP

    88/102

    ConvergenceTechnologies

    Security in Convergent Networks

    Security is a set of procedures designed to protecttransmitted and stored information, as well asnetwork resources

    In convergent networks, security includespreventing: Call interception Phone fraud Network attacks

    Protocol Review

  • 7/31/2019 Convergence Technologies SlideShowSIP

    89/102

    ConvergenceTechnologies

    Protocol Review

    Inherent weaknesses in IPv4 include: Transmission Control Protocol (TCP) handshake

    often manipulated by hackers Internet Protocol (IP) does not sign or encrypt

    packets, and packets are easily manipulated User Datagram Protocol (UDP) often used to

    conduct scans of systems, and UDP packetscan be forged to wage distributed denial-of-service attacks

    Address Resolution Protocol (ARP) does notauthenticate the hosts it resolves and is subjectto ARP cache poisoning

    Overview of Network Attacks

  • 7/31/2019 Convergence Technologies SlideShowSIP

    90/102

    ConvergenceTechnologies

    Overview of Network Attacks

    Network attacks include:

    Spoofing attacks IP spoofing ARP spoofing DNS spoofing

    Man-in-the-middle (hijacking) attacks Password sniffing Connection termination Connection hijacking Packet insertion Poisoning

    Password-guessing attacks Brute-force attacks Dictionary attacks

    Malicious Code

  • 7/31/2019 Convergence Technologies SlideShowSIP

    91/102

    ConvergenceTechnologies

    Malicious Code

    Types of malicious code include: Viruses Worms Illicit servers

    Trojan horses To avoid malicious code, use:

    Virus and worm protection Application management and testing

    Configuration management File signature checking software

    Denial of Service (DOS) Attacks

  • 7/31/2019 Convergence Technologies SlideShowSIP

    92/102

    ConvergenceTechnologies

    Denial-of-Service (DOS) Attacks

    Purpose of a denial-of-service attack is to: Crash a server and make it unusable to

    everyone Assume the identity of the system being

    crashed

    Install a Trojan Flooding is the process of sending an

    overwhelming number of packets to a system Flooding techniques include:

    SYN flood Ping flood UDP flood

    Distributed Denial-of-Service (DDOS)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    93/102

    ConvergenceTechnologies

    Distributed Denial-of-Service (DDOS)Attacks

    Involve the cooperation of several systems to wage acoordinated attach that generates an overwhelmingamount of network traffic

    DDOS attacks involve: A controlling application

    An illicit service A zombie A target

    DOS and DDOS attacks can be diagnosed by:

    Using a packet sniffer to view traffic Using the netstat command to view connections Using intrusion-detection systems

    VLAN Hopping

  • 7/31/2019 Convergence Technologies SlideShowSIP

    94/102

    ConvergenceTechnologies

    VLAN Hopping

    VLAN hopping is an attack in which a hacker intercepts packets as they are sent from one VLANto another on a trunk

    To avoid VLAN hopping: Disable autotrunking Remove the native VLAN setting (VLAN 1) from

    any trunk port

    MAC Address Movements

  • 7/31/2019 Convergence Technologies SlideShowSIP

    95/102

    ConvergenceTechnologies

    MAC Address Movements

    Sudden changes in MAC addresses, such as twosystems suddenly exchanging IP addresses, canindicate that someone is attempting to poison theARP cache

    Monitoring the ARP cache with a tool such asArpwatch can guard against ARP spoofing

    Intrusion Detection

  • 7/31/2019 Convergence Technologies SlideShowSIP

    96/102

    ConvergenceTechnologies

    Intrusion Detection

    Intrusion detection strategies rely on:

    Signature detection Anomaly detection (less common)

    IDS applications require a current signature database IDS application types are:

    Host-based Captures traffic only on host, not on the network wire

    Network-based Does not capture traffic on switched networks Port mirroring enables captures and monitoring on

    switched networks

    Maintaining Your Networks

  • 7/31/2019 Convergence Technologies SlideShowSIP

    97/102

    ConvergenceTechnologies

    Maintaining Your Networks

    Essential tasks for maintaining a convergent network include:

    Scan systems regularly to detect unusual behaviour Upgrade equipment as necessary Install system patches and service packs Keep antivirus files current

    Install firmware upgrades Perform regular backups

    Full Differential Incremental

    Verify that backups are successful Ensure careful (off-site) storage of backup media Choose an optimal backup schedule

    Summary

  • 7/31/2019 Convergence Technologies SlideShowSIP

    98/102

    ConvergenceTechnologies

    Summary

    Define latency, jitter and wander Implement methods for reducing or eliminating latency, jitter and wander (e.g., implementing a jitter buffer, implementingQoS, traffic shaping, VLANs)Explain the impact of large frames on real-time

    communicationsIdentify factors that affect the bandwidth of voice andvideo calls on convergent networks (e.g., latency, protocolincompatibility, MTU, codec choice, compression, QoSissues, packet reordering, loss of feature set)

    Use accepted industry standards such as the Mean OpinionScore (MOS) to determine voice and video quality, includingMOS for popular codecs, standard MOS numbers, R-valueand subjective video quality

    Summary (cont'd)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    99/102

    ConvergenceTechnologies

    Summary (cont d)

    Identify common network bottlenecks in convergent

    networks, including solutions (e.g., monitoring network devices and protocols, creating a baseline, changingconfiguration, upgrading hardware)Analyze traffic in a convergent network and resolveproblems using a packet sniffer, monitoring software, and

    hardware solutionsTroubleshoot convergent communications over wirelessnetworksIdentify problems in contacting emergency services throughconvergent networksParse a Call Detail Record (CDR) and list relevant entries

    Summary (cont'd)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    100/102

    ConvergenceTechnologies

    Summary (cont d)

    Identify types and effects of attacks in convergent networks,

    including man-in-the-middle attacks (e.g., packet sniffing,TCP connection hijacking, registration hijacking), voice mailcompromises, viruses, brute-force and dictionary attacks,zero-day attacks, illicit servers, toll fraud and unsolicited callsDefine denial-of-service (DOS) and distributed DOS (DDOS)

    attacks, and identify ways to counteract them, includingcommon traffic types used (e.g., SYN, UDP or ICMP flood),reconfiguring core upstream routers, using alternative sites,intentional and unintentional DOSExplain the practise and impact of VLAN hopping

    Explain the significance and impact of MAC addressmovements, additions and changes

    Summary (cont'd)

  • 7/31/2019 Convergence Technologies SlideShowSIP

    101/102

    ConvergenceTechnologies

    Summary (cont d)

    Identify types of intrusion detection (e.g., host-based,

    network-based, defining effective signatures, proactivedetection)Explain the practise and impact of VLAN hoppingBack up, upgrade and scan systems to thwart attacks,including backup types, system patches, service packs,firmware upgrades, optimal backup schedule

    Convergence Technologies

  • 7/31/2019 Convergence Technologies SlideShowSIP

    102/102

    Convergence Technologies

    Convergent Network Traffic ProtocolsImplementing VoIPTraffic, Troubleshooting and Security